Branding is an important component in the successful management of your business which speaks about who you are and what you offer. Branding is the business practice of telling your customers and employees what they can expect from you, setting you apart from your competitors.
What is your brand? Elements of your brand include your logo, your color palette, your website, and any marketing or promotional materials. Any and all of which are used to communicate who you are and what you offer.
An established brand is obviously vital with regards to externally sharing your business (e.g. marketing purposes), but what about your internal branding, resources used by your employees and customers? The AMS Connect software provides our clients with a truly customized extranet that makes your users (including your customers) feel like the site is truly theirs.
No matter your industry, your customers need to know that when they use your site (for purposes such as sharing documents or updating project management databases) their data is secure and that they have complete control. AMS Connect provides this security and assurance, and then takes the application one step further by taking your branding elements such as your logo and color scheme, and incorporating these into the extranet used by your customers on a day-to-day basis so they feel as if they are utilizing your website versus a third party software.
Our secure extranet site can be completely tailored to match your brand and your website, incorporating your logo, colors, images, verbiage, and overall feel so your customers have that sense of security which is a top priority of AMS Connect.
Contact us today to see how we can create a customized extranet site for your organization that matches your unique brand while providing your customers with data security and protection.
The database feature in collaboration software can be one of the most utilized and valuable tools that you will use on a day-to-day basis. Anything that you would use a spreadsheet to track or manage, our database feature can do and then some. Database needs vary depending on the organization and internal/external needs; as such, our resource is designed to assist you in organizing employee or client data, tracking duties and assignments, customizing work flows, and efficiently managing projects.
AMS Collaborator is constantly improving our database tool with the goal of enhancing flexibility, usability, efficient organization, and customization to provide you with a tailored resource with security remaining a top priority. As part of our recent release of updates to the software, the database feature underwent a number of improvements, including:
User Interface Updates
In addition to the general user interface updates affecting the overall look and feel of the database tool, many of the navigation and operational elements within the database feature have been enhanced to create an easier and more intuitive workspace for end users. Complete customization is an element of the AMS Connect software that gives our clients the ability to create functional databases for each unique need.
Sortable View Lists
View lists within the database feature may now be assigned a custom sort. This feature controls the way views are displayed, both from the view list as well as when working within a particular database. This update simplifies searching, creating a simpler overall process.
Additional options have been added to further control what displays within a database view. Similar to the sortable view lists update, this update created a more streamlined visual effect in addition to providing you with ability to securely manage who views what within your database.
View Record Scrolling
Record lists that display more data than can fit on the screen will now contain list scroll bars so that records can be viewed without scrolling away from other page elements such as navigation controls, paging, and record operations.
The modifications made within the database feature of AMS Connect have created a more user-friendly, simplified, and functional resource. Contact us today to see how the AMS Connect team can help you efficiently restructure and manage your database and online collaboration needs.
Intranets are designed to be secure from the outside world, but rarely offer any differentiating security once inside since they are designed for sharing information. An extranet though, is designed explicitly for sharing information with others outside the organization. These could be clients, business partners, shareholders, key vendors, or any other entity where secure communication is required. Because the audience may widely vary, the ability to securely manage the content on a granular and role-based level is critical. For example, an executive may want to manage content that a business partner can view, but the business partner should not have rights to make changes to that content.
As software continues to become more sophisticated, the lines between these two begin to blur. Software packages that began as intranet solutions now provide limited extranet functionality; some major Document Management Systems fall into this category, as does Microsoft SharePoint*. However, there are some major considerations that need to be looked at before using an intranet tool to provide access to outside users:
- First, and perhaps the most important, is that as an intranet solution, these software packages reside within your local network. In order to share information with outside users, access to the local network must be granted.
- Second, the management for intranet solutions assumes security is based on the network. This means that even if external access is possible, it either means adding external users to your local network — with all the security concerns that implies — or bolting on some form of external user management tool along with the extra management and configuration that it requires.
- Third, the management and configuration of an intranet solution often depends on server administration rights and tools. For example, to create portals in SharePoint*, a network administrator must login to the server and create the portal, configure and customize it for the specific users, then assign it to the user to manage the content.
Extranet systems on the other hand, are designed from the ground up for external access:
- User management and configuration is integrated and not dependent on any external system.
- Configuration and management is designed to be performed from within the software, eliminating the dependency on network administrators and complex network authentication requirements.
- Finally, the extranet solution can be hosted completely outside the company network, eliminating many of the security concerns raised with a locally hosted application.
Picking a solution
Intranet and extranet solutions both provide invaluable services that can be used by virtually any organization — particularly as security and access control concerns have increased in the last few years. However, it is also important to understand the distinctions between these two solutions, and the strengths and weaknesses each provides. For local access with tight integration with network security, an intranet is the best option. For securely sharing and controlling access to data with outside users (whether business partners, vendors, or clients), a dedicated extranet solution is a better choice than opening your network to outside access.
*Microsoft and SharePoint are Registered Trademarks of Microsoft Corporation
Everyone has heard of the internet. In fact, we all use it nearly every day, and even our cell phones can be used to access content from the internet on a daily or hourly basis. While virtually everyone understands what the internet is, most of us get confused or wonder if someone needs to learn how to spell properly when we see the words “intranet” or “extranet.”
What is an Intranet?
Wikipedia describes an intranet as “a computer network that uses the Internet Protocol technology to securely share any part of an organization’s information and network operating system within that organization.” The key words here are “securely” and “within that organization.” This means that only members of the organization have access to that particular set of electronic files.
The concept of intranets first appeared a few years after the public introduction of the internet and the World Wide Web in the early 1990s. They are in wide use today, providing a familiar environment for employees and executives to access company information. Security is usually managed through the network, requiring some form of local authentication. Information is often proprietary and strictly pertinent to the company. Perhaps the most widely known intranet software solution is Microsoft SharePoint*.
What is an Extranet?
While an extranet has many similarities to an intranet, an extranet performs a very different function. The Wikipedia entry for an extranet describes it as “a computer network that allows controlled access from the outside for specific business or educational purposes… an extranet is similar to a DMZ in that it provides access to needed services for channel partners, without granting access to an organization’s entire network.” Here we see some key terms: “securely” and “access from the outside.” While both intranets and extranets differ from the internet in general because of the “security” component, the key differentiating factor between intranets and extranets is this: Intranets are designed to communicate within an organization and extranets are designed to allow for communication outside the organization.
Read along in our next post as we discuss how to determine which to use (an intranet or an extranet) in what situation, depending on a variety of factors and needs.
Today, sharing data has never been easier. You drop your files into a special folder on your computer, phone, or tablet, and those files become available to all your devices anywhere you need them. For anyone who has suffered a hardware failure and lost data, or forgot to bring a copy of that critical file needed for a presentation, these new services have become invaluable.
The next step in online storage has become collaboration. Now, instead of just centralizing your personal files (providing access wherever you go, and with whatever device you choose) you can go one step further and provide access to your friends, colleagues, and even clients. Drop the file into the right folder, and someone else can view it.
Major software and hardware companies including Apple and Microsoft, in addition to Google and Dropbox, have recently embraced this capability. The step from personal files anywhere you need them to collaborating with clients is a logical move. Now, instead of dealing with the complexities of physical transfer or email, the file is simply accessible anywhere at any time.
But, where does that file go? Recently, many of these service providers have undergone scrutiny for privacy concerns. The balance between security and accessibility can be difficult to maintain. While providing access to anyone anywhere is very compelling, security becomes important with the simple question, “Who else can access my data?”
For most service providers, file sharing and collaboration is nothing more than a commodity service. Accessibility trumps security. It is easier to answer the question, “Can I access I my files?” than it is to ask the question, “Who else can access my files?” If the provider cannot or will not answer that second question, then seriously consider what information you are willing to post.
With security of confidential data being a top concern for many organizations and individuals, collaboration software is a popular option. Providing your business with a secure location for the data that you manage, both in-house and with external clients, AMS-Collaborator is a solution that meets those private, collaboration needs. Contrary to other popular data sharing sites and software, AMS-Collaborator allows you ownership of your data, with a primary goal of sharing and protecting your data.
How does AMS-Collaborator secure your data in a way that Cloud computing does not? Tune in for “Securing Your Cloud” to learn how this collaboration software protects your data while allowing private interactions and collaboration with your clients.